1. The inductive approach to verifying cryptographic protocols;Paulson;J. Computer Security,1998
2. Breaking and fixing the Needham-Schroeder public-key protocol using FDR;Lowe;Software-Concepts and Tools,1996
3. C. Bodei, M. Buchholtz, P. Degano, F. Nielson, and H.R. Nielson, “Control flow analysis can find new flaws too,” in Proceedings of Workshop on Issues in the Theory of Security (WITS 04), (Barcelona, Spain), Apr. 2004
4. N. Thomas, “Performability of a secure electronic voting algorithm,” in Proceedings of the first workshop on Practical Applications of Stochastic Modelling (PASM 2004) (J. Bradley and W. Knottenbelt, eds.), (London, England), pp. 81–93, Sept. 2004. To appear in ENTCS